scholarly journals Target Detection Coverage Algorithm Based on 3D-Voronoi Partition for Three-Dimensional Wireless Sensor Networks

2019 ◽  
Vol 2019 ◽  
pp. 1-15 ◽  
Author(s):  
Xiaochao Dang ◽  
Chenguang Shao ◽  
Zhanjun Hao

The detection of target events is an important research area in the field of wireless sensor networks (WSNs). In recent years, many researchers have discussed the problem of WSN target coverage in a two-dimensional (2D) coordinate system. However, the target detection problem in a 3D coordinate system has not been investigated extensively, and it is difficult to improve the network coverage ratio while ensuring reliable performance of WSN. In addition, sensor nodes that are initially deployed randomly cannot achieve accurate target coverage in practice. Moreover, it is necessary to consider the energy consumption factor owing to the limited energy of the sensor node itself. Hence, with the objective of addressing the target event coverage problem of WSNs in 3D space applications, this paper proposes a target detection coverage algorithm based on 3D-Voronoi partitioning for WSNs (3D-VPCA) in order to ensure reliable performance of the entire network. First, we extend Voronoi division based on the 2D plane, which allows 3D-Voronoi partitioning of sensor nodes in 3D regions. Then, it is optimized according to the 3D-Voronoi neighbouring node partitioning characteristics and combined with the improved algorithm. Next, we set the priority coverage mechanism and introduce the correlation force between the target point and the sensor node in the algorithm, so that the sensor node can move to the target position for accurate coverage. Finally, we carry out related simulation experiments to evaluate the performance and accuracy of the proposed algorithm. The results show that the proposed algorithm can effectively improve the coverage performance of the network while ensuring a high overall coverage ratio.

2019 ◽  
Vol 11 (21) ◽  
pp. 6171 ◽  
Author(s):  
Jangsik Bae ◽  
Meonghun Lee ◽  
Changsun Shin

With the expansion of smart agriculture, wireless sensor networks are being increasingly applied. These networks collect environmental information, such as temperature, humidity, and CO2 rates. However, if a faulty sensor node operates continuously in the network, unnecessary data transmission adversely impacts the network. Accordingly, a data-based fault-detection algorithm was implemented in this study to analyze data of sensor nodes and determine faults, to prevent the corresponding nodes from transmitting data; thus, minimizing damage to the network. A cloud-based “farm as a service” optimized for smart farms was implemented as an example, and resource management of sensors and actuators was provided using the oneM2M common platform. The effectiveness of the proposed fault-detection model was verified on an integrated management platform based on the Internet of Things by collecting and analyzing data. The results confirm that when a faulty sensor node is not separated from the network, unnecessary data transmission of other sensor nodes occurs due to continuous abnormal data transmission; thus, increasing energy consumption and reducing the network lifetime.


Sensor nodes are exceedingly energy compelled instrument, since it is battery operated instruments. In wsn network, every node is liable to the data transmission through the wireless mode [1]. Wireless sensor networks (WSN) is made of a huge no. of small nodes with confined functionality. The essential theme of the wireless sensor network is energy helpless and the WSN is collection of sensor. Every sensor terminal is liable to sensing, store and information clan and send it forwards into sink. The communication within the node is done via wireless network [3].Energy efficiency is the main concentration of a desining the better routing protocol. LEACH is a protocol. This is appropriate for short range network, since imagine that whole sensor node is capable of communication with inter alia and efficient to access sink node, which is not always correct for a big network. Hence, coverage is a problem which we attempt to resolve [6]. The main focus within wireless sensor networks is to increase the network life-time span as much as possible, so that resources can be utilizes efficiently and optimally. Various approaches which are based on the clustering are very much optimal in functionality. Life-time of the network is always connected with sensor node’s energy implemented at distant regions for stable and defect bearable observation [10].


Author(s):  
Ajay Kaushik ◽  
S. Indu ◽  
Daya Gupta

Wireless sensor networks (WSNs) are becoming increasingly popular due to their applications in a wide variety of areas. Sensor nodes in a WSN are battery operated which outlines the need of some novel protocols that allows the limited sensor node battery to be used in an efficient way. The authors propose the use of nature-inspired algorithms to achieve energy efficient and long-lasting WSN. Multiple nature-inspired techniques like BBO, EBBO, and PSO are proposed in this chapter to minimize the energy consumption in a WSN. A large amount of data is generated from WSNs in the form of sensed information which encourage the use of big data tools in WSN domain. WSN and big data are closely connected since the large amount of data emerging from sensors can only be handled using big data tools. The authors describe how the big data can be framed as an optimization problem and the optimization problem can be effectively solved using nature-inspired algorithms.


Author(s):  
C. R. Bharathi ◽  
Alapati Naresh ◽  
Arepalli Peda Gopi ◽  
Lakshman Narayana Vejendla

In wireless sensor networks (WSN), the majority of the inquiries are issued at the base station. WSN applications frequently require collaboration among countless sensor nodes in a network. One precedent is to persistently screen a region and report occasions. A sensor node in a WSN is initially allocated with an energy level, and based on the tasks of that sensor node, energy will be reduced. In this chapter, two proposed methods for secure network cluster formation and authentication are discussed. When a network is established then all the nodes in it must register with cluster head and then authentication is performed. The selection of cluster head is done using a novel selection algorithm and for authenticating the nodes. Also, a novel algorithm for authentication is used in this chapter. The validation and authorization of nodes are carried over by managing the keys in WSN. The results have been analyzed using NS2 simulator with an aid of list of relevant parameters.


2014 ◽  
Vol 2014 ◽  
pp. 1-8 ◽  
Author(s):  
Mohammadjavad Abbasi ◽  
Muhammad Shafie Bin Abd Latiff ◽  
Hassan Chizari

Wireless sensor networks (WSNs) include sensor nodes in which each node is able to monitor the physical area and send collected information to the base station for further analysis. The important key of WSNs is detection and coverage of target area which is provided by random deployment. This paper reviews and addresses various area detection and coverage problems in sensor network. This paper organizes many scenarios for applying sensor node movement for improving network coverage based on bioinspired evolutionary algorithm and explains the concern and objective of controlling sensor node coverage. We discuss area coverage and target detection model by evolutionary algorithm.


Sensors ◽  
2019 ◽  
Vol 19 (21) ◽  
pp. 4625 ◽  
Author(s):  
Km Renuka ◽  
Sachin Kumar ◽  
Saru Kumari ◽  
Chien-Ming Chen

Wireless sensor networks (WSNs) are of prominent use in unmanned surveillance applications. This peculiar trait of WSNs is actually the underlying technology of various applications of the Internet of Things (IoT) such as smart homes, smart cities, smart shopping complexes, smart traffic, smart health, and much more. Over time, WSNs have evolved as a strong base for laying the foundations of IoT infrastructure. In order to address the scenario in which a user wants to access the real-time data directly from the sensor node in wireless sensor networks (WSNs), Das recently proposed an anonymity-preserving three-factor authentication protocol. Das’s protocol is suitable for resource-constrained sensor nodes because it only uses lightweight cryptographic primitives such as hash functions and symmetric encryption schemes as building blocks. Das’s protocol is claimed to be secure against different known attacks by providing formal security proof and security verification using the Automated Validation of Internet Security Protocols and Applications tool. However, we find that Das’s protocol has the following security loopholes: (1) By using a captured sensor node, an adversary can impersonate a legal user to the gateway node, impersonate other sensor nodes to deceive the user, and the adversary can also decrypt all the cipher-texts of the user; (2) the gateway node has a heavy computational cost due to user anonymity and thus the protocol is vulnerable to denial of service (DoS) attacks. We overcome the shortcomings of Das’s protocol and propose an improved protocol. We also prove the security of the proposed protocol in the random oracle model. Compared with the other related protocols, the improved protocol enjoys better functionality without much enhancement in the computation and communication costs. Consequently, it is more suitable for applications in WSNs


Many researches have been proposed for efficiency of data transmission from sensor nodes to sink node for energy efficiency in wireless sensor networks. Among them, cluster-based methods have been preferred In this study, we used the angle formed with the sink node and the distance of the cluster members to calculate the probability of cluster head. Each sensor node sends measurement values to header candidates, and the header candidate node measures the probability value of the header with the value received from its candidate member nodes. To construct the cluster members, the data transfer direction is considered. We consider angle, distance, and direction as cluster header possibility value. Experimental results show that data transmission is proceeding in the direction of going to the sink node. We calculated and displayed the header possibility value of the neighbor nodes of the sensor node and confirmed the candidates of the cluster header for data transfer as the value. In this study, residual energy amount of each sensor node is not considered. In the next study, we calculate the value considering the residual energy amount of the node when measuring the header possibility value of the cluster.


Main problem is when setting up Wireless(W)-Sensor(S)-Network(N) intended for node communication arises for security. Discussed here is a three-tier architecture with two polynomial pools containing wireless routers, key generation center and few access points which are also sensor nodes that can be mobile devices that intend to get better security. The crucial feature of three tier architecture authentication, where communication between WN to access(A) point(P) is established from AP to the sensor node, resulted by pair(P)wise(W) key(K) pre-distribution (PD) methodology and the nodes are authenticated utilizing polynomial keys and Paillier cryptosystem algorithm. Presently, the WN attacks the duplication, such as seeing the nodes in the network. In the event that a nasty node is found and if you want to send packets within the network, you need to store many of keys from both pools for validation. But because there are no sufficient keys available and therefore can't communicate with other nodes in the network. This paper describes an effective contrivance for accomplishing security between node communications by formulating three-level security architecture.


ACTA IMEKO ◽  
2021 ◽  
Vol 10 (2) ◽  
pp. 37
Author(s):  
Lorenzo Ciani ◽  
Marcantonio Catelani ◽  
Alessandro Bartolini ◽  
Giulia Guidi ◽  
Gabriele Patrizi

<p class="Abstract"><span lang="EN-US">The introduction of Big Data and Internet of Things has allowed the rapid development of smart farming technologies. Usually, systems implemented in smart farms monitor environmental conditions and soil parameter to improve productivity, to optimize soil conservation, to save water and to limit plant diseases. Wireless sensor networks are a widespread solution because they allow to implement effective and efficient crop monitoring. At the same time, wireless sensor networks can cover large area, they can ensure fault tolerance and they can acquire large amount of data. Recent literature misses to consider the testing of the hardware performances of such systems according to the actual operating conditions. The effects of a harsh environment on the dynamic metrological performances of sensor nodes are not sufficiently investigated. Consequently, this work deals with the electrical design optimization of a sensor node by means of thermal test used to reproduce the actual operating conditions of the nodes. The results of the node characterization through thermal tests are used to improve the node’s design and consequently to achieve higher performances in harsh operative conditions.</span></p>


Sensors ◽  
2021 ◽  
Vol 21 (22) ◽  
pp. 7613
Author(s):  
Dominik Widhalm ◽  
Karl M. Goeschka ◽  
Wolfgang Kastner

In wireless sensor networks, the quality of the provided data is influenced by the properties of the sensor nodes. Often deployed in large numbers, they usually consist of low-cost components where failures are the norm, even more so in harsh outdoor environments. Current fault detection techniques, however, consider the sensor data alone and neglect vital information from the nodes’ hard- and software. As a consequence, they can not distinguish between rare data anomalies caused by proper events in the sensed data on one side and fault-induced data distortion on the other side. In this paper, we contribute with a novel, open-source sensor node platform for monitoring applications such as environmental monitoring. For long battery life, it comprises mainly low-power components. In contrast to other sensor nodes, our platform provides self-diagnostic measures to enable active node-level reliability. The entire sensor node platform including the hardware and software components has been implemented and is publicly available and free to use for everyone. Based on an extensive and long-running practical experiment setup, we show that the detectability of node faults is improved and the distinction between rare but proper events and fault-induced data distortion is indeed possible. We also show that these measures have a negligible overhead on the node’s energy efficiency and hardware costs. This improves the overall reliability of wireless sensor networks with both, long battery life and high-quality data.


Sign in / Sign up

Export Citation Format

Share Document